Security

The LED lightweight block cipher provide strong security arguments against all state-of-the-art attacks, even in the related-key model. In particular against differential and linear cryptanalysis: one can easily show that any 4-round differential path for any of the LED versions will contain at least 25 active Sboxes (i.e. Sboxes with a non-zero difference) in the single-key model. Even in the more pessimistic related-key model, one can show that any 16-round differential path for any of the LED versions will contain at least 50 active Sboxes.

We will list here the currently known analysis against the LED variants or one of its components. We recall that LED-64 has 32 rounds, while LED-128 (or any LED-x with 64 < x ≤ 128) has 48 rounds

Algorithmic Analysis

- Farzaneh Abed and Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel. "Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers.", ePrint: http://eprint.iacr.org/2012/591.pdf

- Mendel Florian, Vincent Rijmen, Deniz Toz, and Kerem Varıcı. "Differential Analysis of the LED Block Cipher.", Advances in Cryptology, Asiacrypt 2012: 190-207.

- Grosso Vincent, Christina Boura, Benoıt Gérard, and François-Xavier Standaert. "A Note on the Empirical Evaluation of Security Margins against Algebraic Attacks."

- Isobe Takanori, and Kyoji Shibutani. "Security analysis of the lightweight block ciphers XTEA, LED and piccolo." Information Security and Privacy. Springer Berlin/Heidelberg, 2012.

- Ivica Nikolic, Lei Wang, and Shuang Wu. "Cryptanalysis of Round-Reduced LED", Fast Software Encryption 2013.

- Itai Dinur, Orr Dunkelman, Nathan Keller, and Adi Shamir. "Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2", ePrint http://eprint.iacr.org/2013/391.pdf
.

Side-Channels Analysis

- Jeong Kitae, and Changhoon Lee. "Differential Fault Analysis on Block Cipher LED-64." Future Information Technology, Application, and Service (2012): 747-755.

- Veyrat-Charvillon Nicolas, Benoıt Gérard, and François-Xavier Standaert. "Security Evaluations Beyond Computing Power.", ePrint: http://eprint.iacr.org/2012/578.pdf

- Jovanovic Philipp, Martin Kreuzer, and Ilia Polian. "A Fault Attack on the LED Block Cipher." Constructive Side-Channel Analysis and Secure Design (2012): 120-134.

- Jovanovic Philipp, Martin Kreuzer, and Ilia Polian. "An Algebraic Fault Attack on the LED Block Cipher.". ePrint: http://eprint.iacr.org/2012/400.pdf

- Li Wei, Da-wu Gu, Xiao-ling Xia, Chen Zhao, Zhi-qiang Liu, Ya Liu, and Qing-ju Wang. "Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network." International Journal of Computational Intelligence Systems 5, no. 5 (2012): 896-904.

- Li Wei, Gu Da-Wu, Zhao Chen, Liu Zhi-Qiang, and Liu Ya. "Security Analysis of the LED Lightweight Cipher in the Internet of Things." Chinese Journal of Computers (2012)

- Zhaoa Xinjie, Shize Guob, Fan Zhangc, Tao Wanga, Zhijie Shic, and Keke Jia. "Algebraic Differential Fault Attacks on LED using a Single Fault Injection.", ePrint: http://eprint.iacr.org/2012/347.pdf